Xint

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill appears to be a legitimate X/Twitter research CLI, but it needs Review because it uses sensitive X/xAI credentials and OAuth account-write authority that are under-declared in the registry metadata.

Review this before installing. It is not clearly malicious, but it can use paid X/xAI credentials, store OAuth tokens, and change your X account state through follow, list, block, mute, like, and bookmark operations. Provide only the credentials you need, prefer read-only usage, require confirmation for write actions, and avoid enabling webhooks or MCP SSE unless you understand the exposure.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing or using the skill may give the agent access to paid API credentials and X account authorization that are not visible in the registry permission summary.

Why it was flagged

The skill requires an X API bearer token and can optionally use xAI and OAuth credentials, while the registry metadata shown for this review says required env vars and primary credential are none.

Skill content
credentials:\n  - name: X_BEARER_TOKEN ... required: true\n  - name: XAI_API_KEY ...\n  - name: XAI_MANAGEMENT_API_KEY ...\n  - name: X_CLIENT_ID ...\nrequired_env_vars:\n  - X_BEARER_TOKEN\nprimary_credential: X_BEARER_TOKEN
Recommendation

Only install if you intend to provide these credentials. Use least-privilege X/xAI keys, keep OAuth optional until needed, and ensure the registry metadata is corrected to declare required credentials.

What this means

If an agent runs these commands without clear user confirmation, it could change who you follow, block or mute accounts, or alter lists on your X account.

Why it was flagged

The CLI exposes OAuth-backed commands that mutate the user's X account state, including following/unfollowing, list membership changes, and block/mute actions.

Skill content
Lists ... Create a private list ... Add/remove members ... Blocks & Mutes ... Add/remove ... Follow Actions (OAuth)\n\nxint follow @username\nxint unfollow @username
Recommendation

Require explicit user approval for all write/moderation commands, use read-only mode by default where possible, and avoid granting OAuth scopes unless you need account-changing actions.

What this means

A compromised upstream repository, release, or dependency could affect the local installation.

Why it was flagged

The documented installer pipes a remote script into a shell; install.sh then downloads a GitHub release and runs Bun dependency installation. This is common for CLIs but increases supply-chain reliance.

Skill content
curl -fsSL https://raw.githubusercontent.com/0xNyk/xint/main/install.sh | bash
Recommendation

Prefer package-manager installs or manual source review, pin a release version, and require checksum verification when using the installer.

What this means

Search queries, monitoring results, or tweet data could be sent to a configured third-party webhook.

Why it was flagged

The skill can forward watched X data to webhook endpoints. The artifacts disclose HTTPS requirements and an optional allowlist, so this is purpose-aligned but sensitive.

Skill content
watch and stream can send data to webhook endpoints ... Optional host allowlist: XINT_WEBHOOK_ALLOWED_HOSTS=hooks.example.com,*.internal.example
Recommendation

Use webhooks only when needed, prefer trusted HTTPS endpoints, configure XINT_WEBHOOK_ALLOWED_HOSTS, and avoid sending sensitive queries to third parties.

What this means

If enabled or bound too broadly, another local or network client could invoke X search or account-action tools through MCP.

Why it was flagged

The optional MCP server exposes xint commands to other agents/tools. The documentation says stdio/local is default and SSE is opt-in, with policy and auth controls.

Skill content
bun run xint.ts mcp starts a local MCP server exposing xint commands as tools ... no inbound web server unless --sse is explicitly enabled
Recommendation

Keep MCP on local stdio unless needed, use read_only policy by default, require a strong auth token for SSE, and do not bind to non-loopback interfaces unless necessary.

What this means

Local cache, exports, snapshots, or OAuth tokens could reveal research topics or account access if the directory is shared or backed up insecurely.

Why it was flagged

The skill persists API-derived data and OAuth tokens locally. This is disclosed and scoped to the skill directory, but persisted outputs may contain sensitive queries or account information.

Skill content
This skill writes to its own `data/` directory: cache, exports, snapshots, OAuth tokens\n- OAuth tokens stored with restrictive permissions (chmod 600)
Recommendation

Keep the data directory private, review exports before sharing, and delete cached data or OAuth tokens when no longer needed.